Text
Network forensics: tracking hackers through cyberspace
Table of contents:
Part I: Foundation
Chapter 1: Practical Investigative Strategies
Chapter 2: Technical Fundamentals
Chapter 3: Evidence Acquisition
Part II: Traffic Analysis
Chapter 4: Packet Analysis
Chapter 5: Statistical Flow Analysis
Chapter 6: Wireless: Network Forensics Unplugged
Chapter 7: Network Intrusion Detection and Analysis
Part III: Network Devices and Servers
Chapter 8: Event Log Aggregation, Correlation, and Analysis
Chapter 9: Switches, Routers, and Firewalls
Chapter 10: Web Proxies
Chapter 11: Network Tunneling
Chapter 12: Malware Forensics
No other version available